Posts tagged SSH

The Raspberry Pi is already considered a hacker's paradise. However, that assumes that owners have all the software they need to start in the first place. Adafruit wants to give the process a little nudge through its Raspberry Pi Educational Linux Distro. The software includes a customized distrib...

Call the Power Pwn the champion of white hat hacking. Underneath that Clark Kent power strip exterior, there's a Superman of full-scale breach testing that can push the limits of just about any company network, whether it takes 3G, Ethernet or WiFi to get there. Pwnie Express' stealthy sequel to t...

John Welch over at Ars Technica wrote a wonderful post about using an iPad as a system administrator's tool, noting that Apple's tablet is "an addition, not a replacement" to the many tools that IT pros currently use to complete their daily tasks.
Welch brings up points that I discovered when...

Nicknamed after the magical "Nekomata" cat of Japanese nightmares, Cycle Computing's monstrous new supercomputer can now be yours to rent for the low price of $1,279 an hour. By fusing together the face-melting power of 3,809 eight-core Amazon AWS Elastic Computer 2s, the company was able to crea...

Our own Brett Terpstra developed two SSH scripts that let you share Safari browser tabs between multiple Macs. This method is perfect for those Mac users with an iMac or a Mac Pro as their main work machine and a Mac laptop as a secondary machine for checking email, instant messaging or light b...

Prompt from Panic is probably not an app you'll download just to muck around with and then forget. An SSH client is one of those things you either need and use a fair bit, or not at all. Described by developer Panic as "a clean, crisp, and cheerful SSH client: it helps you when you need it, and ...

You can't always just hang around waiting for the next big Microsoft security update. Sometimes you have to go and make your own destiny -- even if it means probing a few dusty ports. That's apparently the mantra of modern hackers who are, according to Akamai, increasingly looking back at telnet as...

Back to My Mac is a feature of MobileMe that allows you to connect remotely to your Macs. Usually this is for screen-sharing or file-sharing through the Finder, but you can also connect via SSH.
In the Terminal app (found in /Applications/Utilities/), you can connect via Shell » New Remote Con...

One must-have app for me with any smartphone is a decent SSH client; I wouldn't move over to the iPhone until I was sure it had one. When Zingersoft's iSSH came along and I was able to kick its tires a bit, I knew I could safely move my life over to the iPhone. RSA/DSA key import support, an X11 cli...

Working for a large company comes with a lot of baggage, the least of which is an RFID security badge. For those small companies who can't afford such extravagantly wireless door key solutions there's another option: this DIY project completed by a team of developers at Sunlight Labs. It all center...

Mac OS X 10.6 Snow Leopard introduced a lot of under-the-hood changes and many are not very obvious. One such change is to the authentication requirements for logging in remotely via SSH.
In 10.5 logging in remotely via SSH was a pretty standard affair. In 10.6, however, security has been beefed ...

While you have to go to quite some lengths to be vulnerable to it, jailbroken iPhones have been under fire for susceptibility to a particular SSH-based type of worm that has seen a lot of press lately. One of the developers, Ashley Towns, who helped to get the "rick" rolling, as it were, has just an...

The internet has been ablaze with reports of jailbroken iPhones being infested with worms. The exploit takes advantage of unwitting jailbreakers who install OpenSSH on their iPhones via Cydia without taking into account all of the impacts on security. The most notable, and now famous, hole in this t...

As inevitable as the sun rising in the East and setting in the West, an innocuous iPhone worm has been transformed into a malicious bank details-stealing virus. The second recorded iPhone infection operates on exactly the same principles as the first, as it targets jailbroken handsets with SSH insta...

Jailbreaking an iPhone certainly brings many benefits, but it's also frought with some peril, as amply demonstrated by a Dutch hacker who decided to go snooping around for vulnerable jailbroken iPhones in the Netherlands. While he apparently didn't actually swipe personal information or cause any d...

Jailbreaking an iPhone certainly brings many benefits, but it's also fraught with some peril, as amply demonstrated by a Dutch hacker who decided to go snooping around for vulnerable jailbroken iPhones in the Netherlands. While he apparently didn't actually swipe personal information or cause any d...

Running a jailbroken iPhone has its risks, as a Dutch hacker has demonstrated. Specifically, he used a bit of port scanning to find jailbroken phones with SSH running in his native Netherlands. From there, he sent unsuspecting users a message that reads, "Your iPhone's been hacked because it's reall...

Well, that was fast. Just a couple hours after we noted Palm warning against hacking webOS to allow data tethering on the Pre, the first set of instructions has popped up. It's not the cleanest hack we've ever seen -- you need to root your phone, enable SSH, and then configure your browser to run ...

Well, that was fast. Just a couple hours after we noted Palm warning against hacking webOS to allow data tethering on the Pre, the first set of instructions has popped up. It's not the cleanest hack we've ever seen -- you need to root your phone, enable SSH, and then configure your browser to run ...

If you work from non-secure networks (coffeehouses, airports, hotels, etc.), or if you've ever wanted to bypass a firewall (YouTube or TUAW blocked at work?) you may be familiar with SSH tunneling. It's come up more than once here on TUAW. It allows you to conduct your Internet business through a se...